Technical
- Title
- Hidden Disk 4.05 for Windows
- Requirements
- Windows 10
- Windows Vista
- Windows 7
- Windows 98
- Windows XP
- Windows 2000
- Windows 2003
- Windows 8
- Language
- English
- Available languages
- German
- English
- Spanish
- French
- Italian
- Japanese
- Polish
- Chinese
- License
- Free
- Latest update
- Author
- Mathew Limdonholk
- SHA-1
9b22f271365a45f1e1201e4308c3a4ff5bbbdeec
- Filename
- hiddis_4_05.exe
Program available in other languages
Changelog
We don’t have any change log information yet for version 4.05 of Hidden Disk. Sometimes publishers take a little while to make this information available, so please check back in a few days to see if it has been updated.
Can you help?
If you have any changelog info you can share with us, we’d love to hear from you! Head over to our Contact page and let us know.
Explore apps
Related software
Free Folder Password Lock
Free Folder Password Lock - File encryption
Shortcut Virus Remover
How to Stop a Shortcut Virus Remover From Ruining Your Computers?
GParted
GNOME Partition Editor (Gparted) is used for creating, reorganizing, and deleting disk partitions. It uses libparted from the parted project to detect and manipulate partition tables. There are optional file system tools that permit managing file systems which are not included in libparted. Key features include: Create partition tables (e.g., MSDOS, GPT). Create, delete, copy, resize, move, check, set new UUID, or label partitions. Manipulate btrfs, ext2/3/4, f2fs, FAT16/32, hfs/hfs+, linux-swap, lvm2 pv, nilfs2, NTFS, reiserfs/4, ufs, and xfs file systems. Enable and disable partition flags (e.g., boot, hidden). Align partitions to mebibyte (MiB) or cylinder boundaries. Attempt data rescue from lost partitions. Supports hardware RAID, motherboard BIOS RAID, Linux software RAID. Supports all sector sizes (e.g., 512, 1024, 2048, 4096 byte sectors). GParted can be used on x86 and x86-64 based computers running Windows, Mac OS X or Linux, by booting from media containing GParted Live. GParted is a great piece of software that everyone should have stashed away, just in case they have any issues with their hard disk. It is really functional, has lots of nifty tools and has good hardware support. Above all, and I cannot emphasize this enough, it is very easy to use!
GMER
GMER is a simple yet powerful anti-malware tool that thoroughly scans your system for vulnerabilities and evidence of Rootkit activity. It has a standard explorer interface with a tabbed toolbar comprising of Processes, Modules, Services, Files, Registry, Rootkit/Malware, CMD, and Autostart. GMER scans for: Inline hooks. Drivers hooking IRP calls. Drivers hooking IDT. Drivers hooking SSDT. Hidden registry keys. Hidden Alternate Data Streams. Hidden disk sectors (MBR). Hidden files. Hidden services. Hidden modules. Hidden threads. Hidden processes. Not only does GMER scan for malware, it also allows you to monitor the following system functions: process creating, driver loading, library loading, file functions, registry entries, and TCP or IP connections. Overall, GMER is a specific tool that specializes in Rootkit removal. It is fast, relatively lightweight and does exactly what is says on the tin: a great anti-Rootkit remover. *GMER runs only on Windows NT/W2K/XP/VISTA/7/8. Important: The developer has recommended downloading GMER with a different name to avoid detection by certain malware, which may prevent GMER from launching.
Comodo Rescue Disk
Comodo Rescue Disk (CRD) is a free bootable Antivirus program that is able to check for viruses, malicious registry keys, root-kits, and more before your computer even starts up as it has been designed to scan your system in a pre-boot environment. The app is intended to be used when dangerous malware has embedded itself so deeply into your system that standard antivirus software is not able to remove it. Comodo Rescue Disk is extremely effective at removing infections, which prevent the Windows operating system from booting up. Key Features include: On-demand malware scanner discovers root-kits and other hidden threats. Extremely efficient malware removal routines thoroughly clean infected computers. Automatically downloads latest virus signatures. Comprehensive event logs provide detailed overview of malware activity. Requires no installation and can be launched direct from removable media. Can be operated in either GUI or text mode. Ensures a PC is clean before proceeding onto OS installation. Intuitive user interface. The interface for Comodo Rescue Disk is very familiar and actually resembles its desktop counterpart, so most users will find it easy to work with. Usefully, it can provide a comprehensive and rigorous scan because it cleans your system before the operating system is loaded. Overall, Comodo Rescue Disk is an great addition to any security toolkit and is a great complement to Comodo’s own Antivirus software. It includes tools that allow you to explore files and take screenshots as well. Minimum hardware requirements, of either a 32-bit or 64-bit OS: Intel Pentium II 233 MHz or equivalent processor, with a minimum RAM requirement of 512 MB, and 210 MB hard disk space. Supported operating systems include: Windows 8, Windows 7, Windows Vista, and Windows XP.
DAA2ISO
Streamlined DAA to ISO Conversion Tool
Skype Portable
Skype Portable For Windows - Does it Require Installation?
TrueCrypt
TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted drive. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password or correct encryption key. Until decrypted, a TrueCrypt volume appears to be nothing more than a series of random numbers. The entire file system is encrypted (i.e., file names, folder names, contents of every file, and free space). This software is highly recommended for securing data on laptops. TrueCrypt performs the following tasks: Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed (pre-boot authentication). Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Please Note: According to the programs author, TrueCrypt is not secure because it could contain unfixed security issues, therefore you should download TrueCrypt only if you are migrating data encrypted by TrueCrypt. As The development of TrueCrypt was ended in 5/2014 you should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
Backup & Recovery 14 Free Edition
Features of Paragon Backup & Recovery
PassFab FixUWin
Fix all the issues on your PC
Ashampoo WinOptimizer Free
An enhanced system tune-up software
Free Duplicate File Finder
Efficient Duplicate File Management Tool
Last updated
Folder Lock
Comprehensive file protection software
Adobe Premiere Pro
Powerful editing tool
Nitro Pro 64-Bit
Feature-packed PDF converter software
Filmora Video Editor
Beginner-friendly video editor with AI tools
Turbo VPN
A popular VPN alternative
Microsoft .NET Framework
Reliable Windows development platform
K-Lite Codec Pack
Media master
Proton VPN
Secure and private internet browsing
WinBox
Control RouterOS easily
MySQL
Powerful and versatile open-source database solution
Free Download Manager
Effective and versatile download tool
PowerISO
All-in-one disk image utility